咨询与建议

限定检索结果

文献类型

  • 235 篇 会议
  • 188 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 424 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 258 篇 工学
    • 186 篇 计算机科学与技术...
    • 156 篇 软件工程
    • 69 篇 信息与通信工程
    • 57 篇 电气工程
    • 32 篇 光学工程
    • 28 篇 生物工程
    • 22 篇 生物医学工程(可授...
    • 19 篇 控制科学与工程
    • 18 篇 电子科学与技术(可...
    • 13 篇 机械工程
    • 13 篇 化学工程与技术
    • 10 篇 交通运输工程
    • 9 篇 动力工程及工程热...
    • 9 篇 建筑学
    • 9 篇 土木工程
    • 8 篇 仪器科学与技术
    • 8 篇 网络空间安全
  • 146 篇 理学
    • 82 篇 数学
    • 37 篇 物理学
    • 35 篇 生物学
    • 31 篇 统计学(可授理学、...
    • 15 篇 化学
    • 11 篇 系统科学
    • 9 篇 地球物理学
  • 55 篇 管理学
    • 35 篇 图书情报与档案管...
    • 26 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 19 篇 医学
    • 15 篇 临床医学
    • 14 篇 基础医学(可授医学...
  • 13 篇 法学
    • 13 篇 社会学
  • 6 篇 教育学
  • 5 篇 经济学
  • 4 篇 农学
  • 1 篇 军事学

主题

  • 32 篇 semantics
  • 30 篇 feature extracti...
  • 21 篇 accuracy
  • 19 篇 training
  • 17 篇 computational mo...
  • 14 篇 contrastive lear...
  • 13 篇 data mining
  • 12 篇 image segmentati...
  • 11 篇 visualization
  • 11 篇 federated learni...
  • 10 篇 speech processin...
  • 10 篇 optimization
  • 10 篇 graph neural net...
  • 9 篇 anomaly detectio...
  • 9 篇 noise
  • 9 篇 data models
  • 8 篇 three-dimensiona...
  • 8 篇 transformers
  • 8 篇 signal processin...
  • 8 篇 neural networks

机构

  • 71 篇 shandong provinc...
  • 61 篇 key laboratory o...
  • 45 篇 shandong enginee...
  • 32 篇 fujian provincia...
  • 29 篇 college of compu...
  • 19 篇 shandong fundame...
  • 19 篇 national enginee...
  • 15 篇 guangdong provin...
  • 15 篇 key laboratory o...
  • 15 篇 guangdong provin...
  • 12 篇 college of mathe...
  • 11 篇 shandong enginee...
  • 11 篇 faculty of data ...
  • 11 篇 shenzhen researc...
  • 10 篇 key laboratory o...
  • 10 篇 school of physic...
  • 10 篇 key laboratory o...
  • 10 篇 guizhou provinci...
  • 9 篇 university of ch...
  • 8 篇 college of compu...

作者

  • 18 篇 guo wenzhong
  • 12 篇 wang shiping
  • 11 篇 jing zhao
  • 11 篇 guo kun
  • 10 篇 zhenyu yang
  • 9 篇 niyato dusit
  • 9 篇 li haizhou
  • 8 篇 wang jinbao
  • 8 篇 xiaodong wu
  • 8 篇 shen linlin
  • 8 篇 ke xiao
  • 7 篇 yu zhiyong
  • 6 篇 chen zhaoliang
  • 6 篇 li yan
  • 6 篇 jiguo yu
  • 6 篇 qin lu
  • 5 篇 hu liang
  • 5 篇 yushui geng
  • 5 篇 zhang lei
  • 5 篇 huang fangwan

语言

  • 390 篇 英文
  • 33 篇 其他
  • 1 篇 中文
检索条件"机构=Provincial Key Laboratory of Data-Intensive Computing"
424 条 记 录,以下是271-280 订阅
排序:
Indirect influence in social networks as an induced percolation phenomenon (vol 119, e2100151119, 2022)
收藏 引用
PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA 2022年 第24期119卷 e2100151119-e2100151119页
作者: Xie, Jiarong Wang, Xiangrong Feng, Ling Zhao, Jin-Hua Liu, Wenyuan Moreno, Yamir Hu, Yanqing School of Computer Science and Engineering Sun Yat-sen University 510006 Guangzhou China Institute of Future Networks Southern University of Science and Technology 518055 Shenzhen China Peng Cheng Laboratory 518066 Shenzhen China Institute of High Performance Computing A*STAR 138632 Singapore Department of Physics National University of Singapore 117551 Singapore Guangdong Provincial Key Laboratory of Nuclear Science Institute of Quantum Matter South China Normal University 510006 Guangzhou China Guangdong-Hong Kong Joint Laboratory of Quantum Matter Southern Nuclear Science Computing Center South China Normal University 510006 Guangzhou China Division of Physics and Applied Physics School of Physical and Mathematical Sciences Nanyang Technological University 637371 Singapore Institute for Biocomputation and Physics of Complex Systems University of Zaragoza 50018 Zaragoza Spain Department of Theoretical Physics University of Zaragoza 50018 Zaragoza Spain ISI Foundation 10126 Torino Italy Department of Statistics and Data Science College of Science Southern University of Science and Technology 518055 Shenzhen China
Percolation theory has been widely used to study phase transitions in network systems. It has also successfully explained various macroscopic spreading phenomena across different fields. Yet, the theoretical framework... 详细信息
来源: 评论
A discovery of two slow pulsars with FAST:“Ronin”from the globular cluster M15
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2024年 第6期67卷 166-180页
作者: Dengke Zhou Pei Wang Di Li Jianhua Fang Chenchen Miao Paulo CCFreire Lei Zhang Dandan Zhang Huaxi Chen Yi Feng Yifan Xiao Jintao Xie Xu Zhang Chenwu Jin Han Wang Yinan Ke Xuerong Guo Rushuang Zhao Chenhui Niu Weiwei Zhu Mengyao Xue Yabiao Wang Jiafu Wu Zhenye Gan Zhongyi Sun Chengjie Wang Jie Zhang Junshuo Zhang Jinhuang Cao Wanjin Lu Research Center for Astronomical Computing Zhejiang LaboratoryHangzhou 311121China National Astronomical Observatories Chinese Academy of SciencesBeijing 100101China Institute for Frontiers in Astronomy and Astrophysics Beijing Normal UniversityBeijing 102206China University of Chinese Academy of Sciences Beijing 100049China New Cornerstone Science Laboratory Shenzhen 518054China Max Planck Institut f¨ur Radioastronomie Bonn 53121Germany Centre for Astrophysics and Supercomputing Swinburne University of TechnologyHawthorn 3122Australia School of Mathematical Sciences School of Physics and Electronic SciencesGuizhou Normal UniversityGuiyang 550001China Guizhou Provincial Key Laboratory of Radio Astronomy and Data Processing Guiyang 550001China School of Physics and Electronic Engineering Qilu Normal UniversityJinan 250200China School of Physics and Electronic Science Guizhou Normal UniversityGuiyang 550001China College of Physical Science and Technology Central China Normal UniversityWuhan 430079China Tencent Youtu Lab Shanghai 201103China
Globular clusters harbor numerous millisecond pulsars,but long-period pulsars(P 100 ms)are rarely *** this study,we employed a fast folding algorithm to analyze observational data from multiple globular clusters obtai... 详细信息
来源: 评论
Ascl: Accelerating Semi-Supervised Learning Via Contrastive Learning
SSRN
收藏 引用
SSRN 2024年
作者: Liu, Haixiong Li, Zuoyong Wu, Jiawei Zeng, Kun Hu, Rong Zeng, Wei Fujian Provincial Key Laboratory of Big Data Mining and Applications School of Computer Science and Mathematics Fujian University of Technology Fuzhou350118 China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control College of Computer and Data Science Minjiang University Fuzhou350121 China School of Intelligent Systems Engineering Shenzhen Campus of Sun Yat-sen University Guangdong Shenzhen518107 China The Key Laboratory of Cognitive Computing and Intelligent Information Processing of Fujian Education Institutions Wuyi University Wuyishan354300 China School of Physics and Mechanical and Electrical Engineering Longyan University Longyan364012 China
SSL(Semi-supervised learning) is widely used in machine learning, which leverages labeled and unlabeled data to improve model performance. SSL aims to optimize class mutual information, but noisy pseudo-labels introdu... 详细信息
来源: 评论
Joint Sparsification and Quantization for Wireless Federated Learning under Communication Constraints
Joint Sparsification and Quantization for Wireless Federated...
收藏 引用
IEEE Workshop on Signal Processing Advances in Wireless Communications (SPAWC)
作者: Junshen Su Xijun Wang Xiang Chen Ray-Guang Cheng School of Electronics and Information Technology Sun Yat-Sen University Guangzhou China Guangdong Provincial Key Laboratory of Big Data Computing The Chinese University of Hong Kong Shenzhen China Department of Electronic and Computer Engineering National Taiwan University of Science and Technology Taipei Taiwan
Communication efficiency is one of the key bottlenecks in Federated Learning (FL). Compression techniques, such as sparsification and quantization, are used to reduce communication overhead. However, joint designs of ...
来源: 评论
Usage: Uncertain Flow Graph and Spatio-Temporal Graph Network-Based Saturation Attack Detection Method
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Kaixi Cui, Yunhe Qian, Qing Chen, Yi Guo, Chun Shen, Guowei Engineering Research Center of Text Computing & Cognitive Intelligence Guizhou University China State Key Laboratory of Public Big Data Guizhou University China Guizhou Provincial Characteristic Key Laboratory of Software Engineering and Information Security Guizhou University China College of Computer Science and Technology Guizhou University China School of Information Guizhou University of Finance and Economics China
With the development of Software-Defined Networking (SDN), its security problems have become important research content. Among these security problems, saturation attack is one of the most destructive problems. Satura... 详细信息
来源: 评论
CLDG: Contrastive Learning on Dynamic Graphs
CLDG: Contrastive Learning on Dynamic Graphs
收藏 引用
International Conference on data Engineering
作者: Yiming Xu Bin Shi Teng Ma Bo Dong Haoyi Zhou Qinghua Zheng Department of Computer Science and Technology Xi’an Jiaotong University China Shaanxi Provincial Key Laboratory of Big Data Knowledge Engineering Xi’an Jiaotong University China Department of Distance Education Xi’an Jiaotong University China School of Software Beihang University China Advanced Innovation Center for Big Data and Brain Computing Beihang University China
The graph with complex annotations is the most potent data type, whose constantly evolving motivates further exploration of the unsupervised dynamic graph representation. One of the representative paradigms is graph c...
来源: 评论
Learnable Graph Convolutional Network and Feature Fusion for Multi-view Learning
arXiv
收藏 引用
arXiv 2022年
作者: Chen, Zhaoliang Fu, Lele Yao, Jie Guo, Wenzhong Plant, Claudia Wang, Shiping College of Computer and Data Science Fuzhou University Fuzhou350116 China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou350116 China Faculty of Computer Science University of Vienna Vienna1090 Austria Research Network Data Science @ Uni Vienna University of Vienna Vienna1090 Austria
In practical applications, multi-view data depicting objectives from assorted perspectives can facilitate the accuracy increase of learning algorithms. However, given multi-view data, there is limited work for learnin... 详细信息
来源: 评论
CLDG: Contrastive Learning on Dynamic Graphs
arXiv
收藏 引用
arXiv 2024年
作者: Xu, Yiming Shi, Bin Ma, Teng Dong, Bo Zhou, Haoyi Zheng, Qinghua Department of Computer Science and Technology Xi’an Jiaotong University China Shaanxi Provincial Key Laboratory of Big Data Knowledge Engineering Xi’an Jiaotong University China Department of Distance Education Xi’an Jiaotong University China School of Software Beihang University China Advanced Innovation Center for Big Data and Brain Computing Beihang University China
The graph with complex annotations is the most potent data type, whose constantly evolving motivates further exploration of the unsupervised dynamic graph representation. One of the representative paradigms is graph c... 详细信息
来源: 评论
Wasserstein Archetypal Analysis
arXiv
收藏 引用
arXiv 2022年
作者: Craig, Katy Osting, Braxton Wang, Dong Xu, Yiming Department of Mathematics University of California Santa Barbara Department of Mathematics University of Utah Salt Lake City School of Science and Engineering & Guangdong Provincial Key Laboratory of Big Data Computing The Chinese University of Hong Kong Shenzhen Guangdong China Corporate Model Risk Wells Fargo
Archetypal analysis is an unsupervised machine learning method that summarizes data using a convex polytope. In its original formulation, for fixed k, the method finds a convex polytope with k vertices, called archety... 详细信息
来源: 评论
Speaker Extraction with Co-Speech Gestures Cue
arXiv
收藏 引用
arXiv 2022年
作者: Pan, Zexu Qian, Xinyuan Li, Haizhou The Integrative Sciences and Engineering Programme The Institute of Data Science National University of Singapore 119077 Singapore The Department of Electrical and Computer Engineering National University of Singapore 119077 Singapore The Guangdong Provincial Key Laboratory of Big Data Computing The Chinese University of Hong Kong Shenzhen518172 China The School of Data Science The Chinese University of Hong Kong Shenzhen518172 China The University of Bremen 28359 Germany
Speaker extraction seeks to extract the clean speech of a target speaker from a multi-talker mixture speech. There have been studies to use a pre-recorded speech sample or face image of the target speaker as the speak... 详细信息
来源: 评论